Information Exposure Affecting glib2.0 package, versions <2.40.2-0ubuntu1.1+esm4
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Confidentiality
High
Threat Intelligence
EPSS
0.07% (31st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1404-GLIB20-1910407
- published 3 Nov 2021
- disclosed 23 Aug 2022
Introduced: 3 Nov 2021
CVE-2021-3800 Open this link in a new tabHow to fix?
Upgrade Ubuntu:14.04
glib2.0
to version 2.40.2-0ubuntu1.1+esm4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0
package and not the glib2.0
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:14.04
relevant fixed versions and status.
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-3800
- https://access.redhat.com/security/cve/CVE-2021-3800
- https://www.openwall.com/lists/oss-security/2017/06/23/8
- https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
- https://bugzilla.redhat.com/show_bug.cgi?id=1938284
- https://lists.debian.org/debian-lts-announce/2022/09/msg00020.html
- https://security.netapp.com/advisory/ntap-20221028-0004/